Hardcoded credentials vulnerability in Trellix ePolicy Orchestrator (ePO) on Premise prior to 5.10 Service Pack 1 Update 2 allows an attacker with admin privileges on the ePO server to read the contents of the orion.keystore file, allowing them to access the ePO database encryption key.  This was possible through using a hard coded password for the keystore.  Access Control restrictions on the file mean this would not be exploitable unless the user is the system admin for the server that ePO is running on.
                
            References
                    Configurations
                    No configuration.
History
                    21 Nov 2024, 09:43
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://thrive.trellix.com/s/article/000013505 - | |
| Summary | 
        
        
  | 
16 May 2024, 07:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-05-16 07:15
Updated : 2024-11-21 09:43
NVD link : CVE-2024-4844
Mitre link : CVE-2024-4844
CVE.ORG link : CVE-2024-4844
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-798
                        
            Use of Hard-coded Credentials
